🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Development Lifecycle

Focus Area: ⚙️ DevSecOps
63
Total Entries
83
Contributors

Top Contributors

Anant Shrivastava(2) Lavakumar Kuppan(2) Madhu Akula(2) Manu Zacharia(2) Nikhil Mittal(2)

All Entries (63 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Spotter – Universal Kubernetes Security Scanner & Policy Enforcer Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-04-03Tool demoBlackhat KubeSF V1.2 - Kubernetes Security Posture Audit Suite Abhishek S, Ajith Prabhu#kubernetes#cloud-workload-protection#container-security+4
2025-03-01TalkNullcon MLOps Under Attack: Threat Modeling Modern AI Systems Presentation Sandeep Singh#ai#ml#ai-security+4
2024-09-26TalkRootcon How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#application-hardening#cicd-pipeline+4
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Video Vivek Ramachandran, Shourya Pratap Singh#web-security#security-assessment#application-pentesting+4
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2024-04-19Tool demoBlackhat AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud Source Code Sherin Stephen, Nishant Sharma, Rishappreet Singh Moonga#aws#ai-security#ai+4
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeran#blueteam#application-hardening#secure-coding+2
2023-09-23PanelNullcon SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE Dinesh Varma, Satish Kumar Dwibhashi, Manoj Kumar#secure-development#security-tools#cicd-security+2
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-12-07TalkBlackhat Cross-Contract Ricochet Attacks & Off-Chain-On-Chain Manipulation of Billion Dollar NFT Collections Presentation Nitesh Dhanjani#exploit#smart-contracts#solidity+4
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-08-13PanelDefcon Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs Niru Ragupathy#security-development-lifecycle#security-tools#incident-management+2
2022-08-11TalkBlackhat Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol Presentation Whitepaper Subhechha Subudhi, Clara Maine, Akke Toeter, Victoria Bosch#zero-day#smart-contracts#security-development-lifecycle+2
2022-08-11Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+4
2022-06-07TalkRsac Continuous Security - Integrating Pipeline Security Presentation Vandana Verma Sehgal#ci-cd#cicd-pipeline#cicd-security+3
2022-06-01TalkSecurityfest Exploitation and automated detection of threats to modern cloud infrastructure Video Krishnaa Srinivasa, Maithri Nadig#aws#vulnerability-assessment#cloud-monitoring+4
2022-04-08TalkNullcon Attack Surfaces for 5G Networks Video Altaf Shaik#application-pentesting#security-development-lifecycle#api-security
2021-11-11Tool demoBlackhat Kubernetes Goat: Interactive Kubernetes Security Learning Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2021-08-04Tool demoBlackhat Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool Source Code Pralhad Chaskar, Vasant Kumar#kubernetes#cloud-workload-protection#container-security+4
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem George#phishing#application-pentesting#security-development-lifecycle+4
2020-03-07PanelNullcon Hack the law: Protection for cybersecurity research in India Video Apar Gupta, Manu Zacharia, Raman Jit Singh Chima, Neelu Tripathy#cyber-law#cybersecurity-strategy#security-development-lifecycle
2019-10-17TalkHitbsecconf Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure Presentation Video Anima Anandkumar#ai#deep-learning#data-analytics+1
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharma#secure-coding#security-assessment#serverless+4
2019-09-12KeynoteGlobalappsec Making a Change, One at a time - Diversity: More than just Gender Vandana Verma Sehgal#security-training#human-factor#cybersecurity-strategy+3
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#ci-cd#cicd-pipeline+4
2019-08-08TalkBlackhat Preventing Authentication Bypass: A Tale of Two Researchers Presentation Ravi Jaiswal, Terry Zhang, Ron Chan#security-development-lifecycle#identity-management#authentication+4
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#secure-coding#ci-cd+3
2019-03-21TalkTroopers Evolution of kernel fuzzers in NetBSD Presentation Video Siddharth M#red-teaming#fuzzing#security-development-lifecycle
2019-03-02PanelNullcon Navigating Risk in the Changing Business and Technology Landscape Video Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil#risk-management#cybersecurity-strategy#business-resilience+4
2018-10-19TalkAppsecdayaustralia Continuous Integration and Delivery with Docker Containers Video Vasant Kumar#docker#blueteam#container-security+4
2018-10-05TalkC0c0n DomGoat - the DOM Security Playground Source Code Lavakumar Kuppan#xss#web-security#input-validation+4
2018-08-08Tool demoBlackhat ThreatPlaybook Source Code Abhay Bhargav, Sharath Kumar#threat-modeling#ci-cd#security-development-lifecycle+4
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahita, Daiping Liu, Mingwei Zhang#blueteam#application-hardening#code-review+4
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singh#ai#blueteam#ai-security+3
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittal#osint#reconnaissance#security-tools+3
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Presentation Swamy Shivaganga Nagaraju#windows#blueteam#security-development-lifecycle+2
2017-03-03TalkNullcon DevOpSec: Rapid Security in the Cloud with AWS and CIS Presentation Video Mikhail Advani, Rajesh Tamhane#devsecops#aws#cloud-compliance+4
2016-10-14TalkAppsecusa Automating API Penetration Testing using fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi#fuzzing#api-security#application-pentesting+4
2016-10-14TalkAppsecusa DevOps to DevSecOps: a 2-dimensional view of security for DevOps Presentation Sanjeev Sharma#application-hardening#secure-coding#security-development-lifecycle+3
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittal#red-teaming#ci-cd#cicd-security+3
2015-11-13TalkBlackhat Continuous Intrusion: Why CI tools are an Attacker’s Best Friends Presentation Video Nikhil Mittal#red-teaming#ci-cd#application-pentesting+4
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-08-05Tool demoBlackhat PixelCaptcha: A unicode based captcha scheme Whitepaper Source Code Gursev Singh Kalra#secure-coding#application-hardening#input-validation+3
2015-08-01TalkC0c0n From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) Anto Joseph#android#mobile-device-management#embedded-systems+2
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexander#secure-coding#security-assessment#application-pentesting+4
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar Kuppan#security-assessment#application-pentesting#security-development-lifecycle+3
2013-11-20TalkAppsecusa Why is SCADA Security an Uphill Battle? Video Amol Sarwate#scada#application-pentesting#application-hardening+4
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhat#red-teaming#bypassing#exploit-delivery+3
2012-08-03TalkC0c0n Gathering security requirements K v Prashant, Saleem Ahamed#security-testing#secure-development#security-development-lifecycle+2
2010-08-01TalkC0c0n Concept, Methodology and Challenges in Computer Forensics Sebastian Edassery#forensics#digital-forensics#incident-management+2
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4
2008-10-29TalkHitbsecconf Browser Exploits - A New Model for Browser Security Video Saumil Shah#red-teaming#application-pentesting#code-review+3
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Presentation Saumil Shah#red-teaming#application-hardening#browser-security+4